Difference between revisions of "CANS 2021"
Jump to navigation
Jump to search
| Line 20: | Line 20: | ||
}} | }} | ||
==== Areas of Interest ==== | ==== Areas of Interest ==== | ||
| − | + | * • Access Control | |
| − | • Access Control | + | * • Embedded System Security |
| − | • Embedded System Security | + | * • Security in Pervasive Systems |
| − | • Security in Pervasive Systems | + | * • Anonymity & Pseudonymity |
| − | • Anonymity & Pseudonymity | + | * • Formal Methods for Security |
| − | • Formal Methods for Security | + | * • Security in Social Networks |
| − | • Security in Social Networks | + | * • Applied Cryptography |
| − | • Applied Cryptography | + | * • Hash Functions |
| − | • Hash Functions | + | * • Sensor Network Security |
| − | • Sensor Network Security | + | * • Attacks & Malicious Code |
| − | • Attacks & Malicious Code | + | * • Identity Management |
| − | • Identity Management | + | * • Trust Management |
| − | • Trust Management | + | * • Authentication & Identification |
| − | • Authentication & Identification | + | * • Key Management |
| − | • Key Management | + | * • Usable Security |
| − | • Usable Security | + | * • Biometrics |
| − | • Biometrics | + | * • Language-Based Security |
| − | • Language-Based Security | + | * • Virtual Private Networks |
| − | • Virtual Private Networks | + | * • Block & Stream Ciphers |
| − | • Block & Stream Ciphers | + | * • Malware Analysis and Detection |
| − | • Malware Analysis and Detection | + | * • Wireless and Mobile Security |
| − | • Wireless and Mobile Security | + | * • Blockchain Security and Privacy |
| − | • Blockchain Security and Privacy | + | * • Network Security |
| − | • Network Security | + | * • Peer-to-Peer Security & Privacy |
| − | • Peer-to-Peer Security & Privacy | + | * • Cryptographic Algorithms and Primitives |
| − | • Cryptographic Algorithms and Primitives | + | * • Security and Privacy for Big Data |
| − | • Security and Privacy for Big Data | + | * • Privacy-Enhancing Technologies |
| − | • Privacy-Enhancing Technologies | + | * • Cryptographic Protocols |
| − | • Cryptographic Protocols | + | * • Security and Privacy in the Cloud |
| − | • Security and Privacy in the Cloud | + | * • Public Key Cryptography |
| − | • Public Key Cryptography | + | * • Cyberphysical Security |
| − | • Cyberphysical Security | + | * • Security in Content Delivery |
| − | • Security in Content Delivery | + | * • Secure Distributed Computing |
| − | • Secure Distributed Computing | + | * • Data and Application Security |
| − | • Data and Application Security | + | * • Security in Crowdsourcing |
| − | • Security in Crowdsourcing | + | * • Security Architectures |
| − | • Security Architectures | + | * • Denial of Service Protection |
| − | • Denial of Service Protection | + | * • Security in Grid Computing |
| − | • Security in Grid Computing | + | * • Security Metrics |
| − | • Security Metrics | + | * • Data Protection |
| − | • Data Protection | + | * • Security in the Internet of Things |
| − | • Security in the Internet of Things | + | * • Security Models |
| − | • Security Models | + | * • Data and Computation Integrity |
| − | • Data and Computation Integrity | + | * • Security in Location Services |
| − | • Security in Location Services | + | * • Security Policies |
| − | • Security Policies | ||
Revision as of 16:40, 11 February 2021
| CANS 2021 | |
|---|---|
International Conference on Cryptology and Network Security
| |
| Ordinal | 20 |
| Event in series | CANS |
| Dates | 2021/12/13 (iCal) - 2021/12/15 |
| Homepage: | https://cans2021.at/ |
| Twitter account: | @CansConference |
| Submitting link: | https://easychair.org/conferences/?conf=cans2021 |
| Location | |
| Location: | Vienna, Austria |
| Important dates | |
| Papers: | 2021/06/01 |
| Submissions: | 2021/06/01 |
| Notification: | 2021/09/01 |
| Camera ready due: | 2021/10/01 |
| Committees | |
| General chairs: | Stephan Krenn |
| PC chairs: | Mauro Conti, Marc Stevens |
| Table of Contents | |
| Tweets by @CansConference | |
Areas of Interest
- • Access Control
- • Embedded System Security
- • Security in Pervasive Systems
- • Anonymity & Pseudonymity
- • Formal Methods for Security
- • Security in Social Networks
- • Applied Cryptography
- • Hash Functions
- • Sensor Network Security
- • Attacks & Malicious Code
- • Identity Management
- • Trust Management
- • Authentication & Identification
- • Key Management
- • Usable Security
- • Biometrics
- • Language-Based Security
- • Virtual Private Networks
- • Block & Stream Ciphers
- • Malware Analysis and Detection
- • Wireless and Mobile Security
- • Blockchain Security and Privacy
- • Network Security
- • Peer-to-Peer Security & Privacy
- • Cryptographic Algorithms and Primitives
- • Security and Privacy for Big Data
- • Privacy-Enhancing Technologies
- • Cryptographic Protocols
- • Security and Privacy in the Cloud
- • Public Key Cryptography
- • Cyberphysical Security
- • Security in Content Delivery
- • Secure Distributed Computing
- • Data and Application Security
- • Security in Crowdsourcing
- • Security Architectures
- • Denial of Service Protection
- • Security in Grid Computing
- • Security Metrics
- • Data Protection
- • Security in the Internet of Things
- • Security Models
- • Data and Computation Integrity
- • Security in Location Services
- • Security Policies